CompTIA CASP+ Prep Course



Course Details:

Length: 5 days

Price: $2,240/person (USD)

Group Price: Request Quote

Training Reviews

Course Features:

Live Instructor Teaching

Certificate of Completion

Digital Badge

Courseware: Print

Free 6 Month Online Retake

Hands-On Learning?: Yes

Software Lab Included?: Yes

Delivery Methods:

Live Online

Individuals and Groups
@ Your Location

Onsite for Teams

Group Teams
@ Your Organization

This is an instructor-led course. It is taught by an instructor live online or at organizations for groups.
For team training, we can teach onsite at your office or private live online.

 

Course Overview

The CompTIA CASP+ training offers preparation for exam CAS-004. Practical examples and real-world insights illustrate critical topics and show what essential practices look like on the ground. At the same time, detailed explanations of technical and business concepts give you the background you need to apply, identify and implement appropriate security solutions.

CompTIA Advanced Security Practitioner (CASP+) ensures that security practitioners stay on top of the ever-changing security landscape. The CompTIA CASP+ CAS-004 Certification Class offers complete, up-to-date coverage of the CompTIA CAS-004 exam.

This class covers security architecture, security operations, security engineering, cryptography, governance, risk, and compliance. From operations and architecture concepts, techniques and requirements to risk analysis, mobile and small-form factor device security, secure cloud integration, and cryptography, you’ll learn the cybersecurity technical skills you’ll need to succeed on the new CAS-004 exam, impress interviewers during your job search, and excel in your new career in cybersecurity implementation.

Learning Objectives
  • Understand Cloud Security Alliance (CSA) and the FedRAMP programs
  • Respond to Advanced Persistent Threats (APT) by deploying hunt teams
  • Understand the Cyber Kill Chain framework as well as MITRE ATT&CK and Diamond Models
  • Deploy advanced cryptographic solutions using the latest FIPS standards
  • Understand compliance requirements for GDPR, PCI, DSS, and COPPA
  • Secure Internet of Things (IoT), Industrial control systems (ICS), and SCADA
  • Plan for incident response and digital forensics using advanced tools Master cryptography, controls, vulnerability analysis, and network security

Register Early: Registration Deadline is 2 Weeks Prior to Class Start.


Course Notes

Target Audience

This CompTIA course is perfect for anyone preparing for the CASP+ (CAS-004) exam and a new career in cybersecurity, CASP+ CompTIA Advanced Security Practitioner Study Guide Exam CAS-004 is also an ideal resource for current IT professionals wanting to promote their cybersecurity skills or prepare for a career transition into enterprise cybersecurity.


Knowledge Prerequisites

CompTIA Security+

Related Certifications

CompTIA CASP+ CAS-004 Certification

Certification Notes: Certification exams are administered by third party testing companies. Our courses prepare you for the certification exam, which is an additional fee paid to the testing provider. You must contact the corresponding testing provider to take a certification exam.

 

Course Topics

Chapter 1: Risk Management
Risk Terminology
The Risk Assessment Process
Asset Identification
Information Classification
Risk Assessment
Risk Assessment Options
Implementing Controls
Policies Used to Manage Employees
Pre-Employment Policies
Employment Policies
End of Employment and Termination Procedures
Cost-Benefit Analysis
Continuous Monitoring
Enterprise Security Architecture Frameworks and Governance
Training and Awareness for Users
Best Practices for Risk Assessments
Business Continuity Planning and Disaster Recovery
Reviewing the Effectiveness of Existing Security Controls
Conducting Lessons Learned and After-Action Reviews
Creation, Collection, and Analysis of Metrics
Metrics
Trend Data
Analyzing Security Solutions to Ensure They Meet Business Needs
Testing Plans
Internal and External Audits
Using Judgment to Solve Difficult Problems
Summary
Exam Essentials
Review Questions

 

Chapter 2: Configure and Implement Endpoint Security Controls
Hardening Techniques
Address Space Layout Randomization Use
Hardware Security Module and Trusted Platform Module
Trusted Operating Systems
Compensating Controls
Summary
Exam Essentials
Review Questions

 

Chapter 3: Security Operations Scenarios
Threat Management
Types of Intelligence
Threat Hunting
Threat Emulation
Actor Types
Intelligence Collection Methods
Open-Source
Intelligence
Human Intelligence and Social Engineering
Frameworks
MITRE Adversarial Tactics, Techniques and Common Knowledge
ATT&CK for Industrial Control Systems
Cyber Kill Chain
Diamond Model of Intrusion Analysis
Indicators of Compromise
Reading the Logs
Intrusion Detection and Prevention
Notifications and Responses to IoCs
Response
Summary
Exam Essentials
Review Questions

 

Chapter 4: Security Ops: Vulnerability Assessments and Operational Risk
Terminology
Vulnerability Management
Security Content Automation Protocol
Self-Assessment vs. Third-Party Vendor Assessment
Patch Management
Information Sources
Tools
Assessments
Penetration Testing
Assessment Types
Vulnerabilities
Buffer Overflow
Integer Overflow
Memory Leaks
Race Conditions (TOC/TOU)
Resource Exhaustion
Data Remnants
Use of Third-Party Libraries
Code Reuse
Cryptographic Vulnerabilities
Broken Authentication
Security Misconfiguration
Inherently Vulnerable System/Application
Client-Side Processing vs. Server-Side Processing
Attacks
Proactive Detection
Incident Response
Countermeasures
Deceptive Technology
USB Key Drops
Simulation
Security Data Analytics
Application Control
Allow and Block Lists
Security Automation
Physical Security
Summary
Exam Essentials
Review Questions

 

Chapter 5: Compliance and Vendor Risk
Shared Responsibility in Cloud Computing
Cloud Service/Infrastructure Models
Cloud Computing Providers and Hosting Options
Benefits of Cloud Computing
Security of On-Demand/Elastic Cloud Computing
Geographic Location
Infrastructure
Compute
Storage
Networking
Managing and Mitigating Risk
Security Concerns of Integrating Diverse Industries
Regulations, Accreditations, and Standards
PCI DSS
GDPR
ISO
CMMI
NIST
COPPA
CSA-STAR
HIPAA, SOX, and GLBA
Contract and Agreement Types
Third-Party Attestation of Compliance
Legal Considerations
Summary
Exam Essentials
Review Questions

 

Chapter 6: Cryptography and PKI
The History of Cryptography
Cryptographic Goals and Requirements
Supporting Security Requirements
Compliance and Policy Requirements
Privacy and Confidentiality Requirements
Integrity Requirements
Nonrepudiation
Risks with Data
Data at Rest
Data in Transit
Data in Process/Data in Use
Hashing
Message Digest
Secure Hash Algorithm
Message Authentication Code
Hashed Message Authentication Code
RACE Integrity Primitives Evaluation Message Digest
Poly1305
Symmetric Algorithms
Data Encryption Standard
Triple DES
Rijndael and the Advanced Encryption Standard
ChaCha
Salsa20
International Data Encryption Algorithm
Rivest Cipher Algorithms
Counter Mode
Asymmetric Encryption
Diffie–Hellman
RSA
Elliptic Curve Cryptography
ElGamal
Hybrid Encryption and Electronic Data Exchange (EDI)
Public Key Infrastructure Hierarchy
Certificate Authority
Registration Authority
Digital Certificates
Certificate Revocation List
Certificate Types
Certificate Distribution
The Client’s Role in PKI
Implementation of Cryptographic Solutions
Application Layer Encryption
Transport Layer Encryption
Internet Layer Controls
Additional Authentication Protocols
Cryptocurrency
Digital Signatures
Recognizing Cryptographic Attacks
Troubleshooting Cryptographic Implementations
Summary
Exam Essentials
Review Questions

 

Chapter 7: Incident Response and Forensics
The Incident Response Framework
Event Classifications
Triage Events
Pre-Escalation Tasks
The Incident Response Process
Response Playbooks and Processes
Communication Plan and Stakeholder Management
Forensic Concepts
Principles, Standards, and Practices
The Forensic Process
Forensic Analysis Tools
File Carving Tools
Binary Analysis Tools
Analysis Tools
Imaging Tools
Hashing Utilities
Live Collection vs. Postmortem Tools
Summary
Exam Essentials
Review Questions

 

Chapter 8: Security Architecture
Security Requirements and Objectives for a Secure Network Architecture
Services
Segmentation
Deperimeterization/Zero Trust
Merging Networks from Various Organizations
Software-Defined Networking
Organizational Requirements for Infrastructure Security Design
Scalability
Resiliency
Automation
Containerization
Virtualization
Content Delivery Network
Integrating Applications Securely into an Enterprise Architecture
Baseline and Templates
Software Assurance
Considerations of Integrating Enterprise Applications
Integrating Security into the Development Life Cycle
Data Security Techniques for Securing Enterprise Architecture
Data Loss Prevention
Data Loss Detection
Data Classification, Labeling, and Tagging
Obfuscation
Anonymization
Encrypted vs. Unencrypted
Data Life Cycle
Data Inventory and Mapping
Data Integrity Management
Data Storage, Backup, and Recovery
Security Requirements and Objectives for Authentication and Authorization Controls
Credential Management
Password Policies
Federation
Access Control
Protocols
Multifactor Authentication
One-Time Passwords
Hardware Root of Trust
Single Sign-On
JavaScript Object Notation Web Token
Attestation and Identity Proofing
Summary
Exam Essentials
Review Questions

 

Chapter 9: Secure Cloud and Virtualization
Implement Secure Cloud and Virtualization Solutions
Virtualization Strategies
Deployment Models and Considerations
Service Models
Cloud Provider Limitations
Extending Appropriate On-Premises Controls
Storage Models
How Cloud Technology Adoption Impacts Organization Security
Automation and Orchestration
Encryption Configuration
Logs
Monitoring Configurations
Key Ownership and Location
Key Life-Cycle Management
Backup and Recovery Methods
Infrastructure vs. Serverless Computing
Software-Defined Networking
Misconfigurations
Collaboration Tools
Bit Splitting
Data Dispersion
Summary
Exam Essentials
Review Questions

 

Chapter 10: Mobility and Emerging Technologies
Emerging Technologies and Their Impact on Enterprise Security and Privacy
Artificial Intelligence
Machine Learning
Deep Learning
Quantum Computing
Blockchain
Homomorphic Encryption
Distributed Consensus
Big Data
Virtual/Augmented Reality
3D Printing
Passwordless Authentication
Nano Technology
Biometric Impersonation
Secure Enterprise Mobility Configurations
Managed Configurations
Deployment Scenarios
Mobile Device Security Considerations
Security Considerations for Technologies, Protocols, and Sectors
Embedded Technologies
ICS/Supervisory Control and Data Acquisition
Protocols
Sectors
Summary
Exam Essentials
Review Questions

 

Appendix: Answers to Review Questions


Course FAQs

This course is taught by a live instructor and is available in two class formats:

  1. Live Online for Individuals
  2. Onsite/Online for Private Groups







Related Cyber Security Information:

Public instructor-led Cyber Security course prices start at $2,195 per student. Group training discounts are available.

Self-Paced Cyber Security eLearning courses cost $300 at the starting point per student. Group purchase discounts are available.

 







Registration:

Have a Group?
Request Private Training

7/21/2025 10:00:00 AM
Online Class

Registration Deadline - 07/06/2025

 

10/6/2025 10:00:00 AM
Online Class

Registration Deadline - 09/21/2025

Start your training today!